Presented by
Anusha H N
Avinasha H N
Niha Noorain
Syed Musthak K S
Under the guidance of
Mrs. Shylaja L.N., B.E., M.Tech.
Associate Professor
Department of Information Science and Engineering

 Aim
 Scope
 Objectives
 Introduction
 Literature Survey
 Methodology
 Expected Result
 References
 Gantt Chart
Contents
2

 To prevent the selective jamming attack by
combining three cryptographic primitives such as
strong hiding commitment scheme, cryptographic
puzzle hiding scheme and all-or-nothing
transformations scheme.
3
Aim

 Project show that selective jamming attacks can be
launched by performing real time packet
classification at the physical layer.
 To mitigate these attacks, proposed project develop
three schemes that prevent real-time packet
classification by combining cryptographic primitives
with physical-layer attributes.
4
Scope

 Strong Hiding Commitment Scheme (SHCS),
Cryptographic Puzzle Hiding Scheme(CPHS) and
All-Or-Nothing Transformation (AONT) scheme.
 This project analyze the security of methods and
evaluate their computational and communication
overhead.
5
Contd…

 To prevent the selective jamming attack.
 To avoid packet dropouts due to collisions between
neighboring nodes.
 To show that a selective jammer can significantly
impact performance with very low effort on network
protocol such as TCP and routing.
 To secure the packet transmission in wireless
networks.
Objectives
6

 “Coping with a Smart Jammer in Wireless
Networks: A Stackelberg Game Approach”[2013]
-Dejun Yang
 Technique used: Power Control Smart Jammer game.
 Drawback: Jammer improves its utility in
UNAWARE condition.
7
Literature Survey

 “Denial of Service Attacks in Wireless Network: The
Case of Jammer”.[2011]
-Konstantinos Pelechrinis
 Technique used: Intrusion Detection Scheme(IDS)
used to detect the attack.
 Intrusion Prevention System(IPS) used to prevent
the attack.
8
Contd…

 “Detection of Jamming Attacks in Wireless Ad Hoc
Networks using Error Distribution”.[2009]
-Ali Hamieh
 Technique used: detection by correlation to detect
the jammer.
 Drawback: to detect the jamming attack dependency
measure is needed from all nodes.
 There is no technique to prevent selective jamming
attack
9
Contd…

 “Effects of Denial-of-Sleep attacks on Wireless Sensor
Network mac protocols”.[2009]
-David R. Raymond
 Technique used: jamming identification & mitigation,
anti-reply protection
 Drawback: Transmitted message from a node can easily
read by attacker because message is not encrypted.
 Attacker can access any node using received message as a
authorized and make busy state such attacks are selective
jamming attack.
10
Contd…

“JAMMING”
 How does it happen?
Realization of selective
jamming attack
11
Fig.1: Jamming Attack

 1. Strong Hiding Commitment Scheme (SHCS)
 2. Cryptographic Puzzle Hiding Scheme (CPHS)
 3.All-Or-Nothing-Transformation Scheme(AONT)
Methodology
12

 Proposing a strong hiding commitment scheme
(SHCS), which is based on symmetric cryptography.
The main motivation is to satisfy the strong hiding
property while keeping the computation and
communication overhead to a minimum.
13
SHCS

 Presenting a packet hiding scheme based on
cryptographic puzzles. The main idea behind such
puzzles is to force the recipient of a puzzle execute a
pre-defined set of computations before he is able to
extract a secret of interest.
14
CPHS

 Here proposed project send a sequence of pseudo
messages corresponding to original messages. The
jammer cannot perform packet classification until all
pseudo messages corresponding to the original
packet have been received and the inverse
transformation has been applied.
15
AONT

The Selective Jamming attack will be avoided and the
packets will be transmitted safely to the proper
destination
16
Expected Result

1. M. Strasser, C. Po ¨pper, and S. Capkun, “Efficient
Uncoordinated fhss Anti-Jamming Communication,”
Proc. ACM Int’l Symp. Mobile Ad Hoc Networking and
Computing (MobiHoc), pp. 207-218, 2009.
2. P. Tague, M. Li, and R. Poovendran, “Mitigation of
Control Channel Jamming under Node Capture
Attacks,” IEEE Trans. Mobile Computing, vol. 8, no. 9,
pp. 1221-1234, Sept. 2009.
3. B. Thapa, G. Noubir, R. Rajaramanand, and B. Sheng,
“On the Robustness of IEEE802.11 Rate Adaptation
Algorithms against Smart Jamming,” Proc. ACM Conf.
Wireless Network Security (WiSec), 2011.
References
17

Gantt Chart - Schedule for carrying different
actvities during project work
18

19
Contd…

20

Preventing jamming attack by combining cryptography

  • 1.
    Presented by Anusha HN Avinasha H N Niha Noorain Syed Musthak K S Under the guidance of Mrs. Shylaja L.N., B.E., M.Tech. Associate Professor Department of Information Science and Engineering
  • 2.
      Aim  Scope Objectives  Introduction  Literature Survey  Methodology  Expected Result  References  Gantt Chart Contents 2
  • 3.
      To preventthe selective jamming attack by combining three cryptographic primitives such as strong hiding commitment scheme, cryptographic puzzle hiding scheme and all-or-nothing transformations scheme. 3 Aim
  • 4.
      Project showthat selective jamming attacks can be launched by performing real time packet classification at the physical layer.  To mitigate these attacks, proposed project develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes. 4 Scope
  • 5.
      Strong HidingCommitment Scheme (SHCS), Cryptographic Puzzle Hiding Scheme(CPHS) and All-Or-Nothing Transformation (AONT) scheme.  This project analyze the security of methods and evaluate their computational and communication overhead. 5 Contd…
  • 6.
      To preventthe selective jamming attack.  To avoid packet dropouts due to collisions between neighboring nodes.  To show that a selective jammer can significantly impact performance with very low effort on network protocol such as TCP and routing.  To secure the packet transmission in wireless networks. Objectives 6
  • 7.
      “Coping witha Smart Jammer in Wireless Networks: A Stackelberg Game Approach”[2013] -Dejun Yang  Technique used: Power Control Smart Jammer game.  Drawback: Jammer improves its utility in UNAWARE condition. 7 Literature Survey
  • 8.
      “Denial ofService Attacks in Wireless Network: The Case of Jammer”.[2011] -Konstantinos Pelechrinis  Technique used: Intrusion Detection Scheme(IDS) used to detect the attack.  Intrusion Prevention System(IPS) used to prevent the attack. 8 Contd…
  • 9.
      “Detection ofJamming Attacks in Wireless Ad Hoc Networks using Error Distribution”.[2009] -Ali Hamieh  Technique used: detection by correlation to detect the jammer.  Drawback: to detect the jamming attack dependency measure is needed from all nodes.  There is no technique to prevent selective jamming attack 9 Contd…
  • 10.
      “Effects ofDenial-of-Sleep attacks on Wireless Sensor Network mac protocols”.[2009] -David R. Raymond  Technique used: jamming identification & mitigation, anti-reply protection  Drawback: Transmitted message from a node can easily read by attacker because message is not encrypted.  Attacker can access any node using received message as a authorized and make busy state such attacks are selective jamming attack. 10 Contd…
  • 11.
     “JAMMING”  How doesit happen? Realization of selective jamming attack 11 Fig.1: Jamming Attack
  • 12.
      1. StrongHiding Commitment Scheme (SHCS)  2. Cryptographic Puzzle Hiding Scheme (CPHS)  3.All-Or-Nothing-Transformation Scheme(AONT) Methodology 12
  • 13.
      Proposing astrong hiding commitment scheme (SHCS), which is based on symmetric cryptography. The main motivation is to satisfy the strong hiding property while keeping the computation and communication overhead to a minimum. 13 SHCS
  • 14.
      Presenting apacket hiding scheme based on cryptographic puzzles. The main idea behind such puzzles is to force the recipient of a puzzle execute a pre-defined set of computations before he is able to extract a secret of interest. 14 CPHS
  • 15.
      Here proposedproject send a sequence of pseudo messages corresponding to original messages. The jammer cannot perform packet classification until all pseudo messages corresponding to the original packet have been received and the inverse transformation has been applied. 15 AONT
  • 16.
     The Selective Jammingattack will be avoided and the packets will be transmitted safely to the proper destination 16 Expected Result
  • 17.
     1. M. Strasser,C. Po ¨pper, and S. Capkun, “Efficient Uncoordinated fhss Anti-Jamming Communication,” Proc. ACM Int’l Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 207-218, 2009. 2. P. Tague, M. Li, and R. Poovendran, “Mitigation of Control Channel Jamming under Node Capture Attacks,” IEEE Trans. Mobile Computing, vol. 8, no. 9, pp. 1221-1234, Sept. 2009. 3. B. Thapa, G. Noubir, R. Rajaramanand, and B. Sheng, “On the Robustness of IEEE802.11 Rate Adaptation Algorithms against Smart Jamming,” Proc. ACM Conf. Wireless Network Security (WiSec), 2011. References 17
  • 18.
     Gantt Chart -Schedule for carrying different actvities during project work 18
  • 19.
  • 20.